Advanced Search



56 results found in all.
index Title
16A power-aware code-compression design for RISC/VLIW architecture
Author(s):Che-Wei Lin, Chang Hong Lin, Wei Jhih Wang  Clicked:6587  Download:2847  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.8 P.629-637  DOI:10.1631/jzus.C1000321
17Funneling media access control (MAC) protocol for underwater acoustic sensor networks
Author(s):Guang-yu Fan, Hui-fang Chen, Lei Xie, Kuang Wang  Clicked:8262  Download:3559  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.11 P.932-941  DOI:10.1631/jzus.C1000388
18Electromagnetic environment around a high-speed railway using analytical technique
Author(s):Yong-jian Zhi, Bin Zhang, Kai Li, Xiao-yan Huang, You-tong Fang, Wen-ping Cao  Clicked:4883  Download:3411  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2011 Vol.12 No.12 P.950-956  DOI:10.1631/jzus.A11GT004
19Resource allocation algorithm with limited feedback for multicast single frequency networks
Author(s):Ming-wei Tang, Xiao-xiang Wang  Clicked:7683  Download:3165  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.2 P.146-154  DOI:10.1631/jzus.C1100108
20Asymmetry-aware load balancing for parallel applications in single-ISA multi-core systems
Author(s):Eunsung Kim, Hyeonsang Eom, Heon Y. Yeom  Clicked:6877  Download:2905  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.6 P.413-427  DOI:10.1631/jzus.C1100198
21EDA: an enhanced dual-active algorithm for location privacy preservation in mobile P2P networks
Author(s):Yan-zhe Che, Kevin Chiew, Xiao-yan Hong, Qiang Yang, Qin-ming He  Clicked:6862  Download:2992  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.5 P.356-373  DOI:10.1631/jzus.C1200267
22Mobility assisted spectrum aware routing protocol for cognitive radio ad hoc networks
Author(s):Omid Abedi, Reza Berangi  Clicked:7493  Download:4811  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.11 P.873-886  DOI:10.1631/jzus.C1200334
23An analytical model for source code distributability verification
Author(s):Ayaz Isazadeh, Jaber Karimpour, Islam Elgedawy, Habib Izadkhah  Clicked:7363  Download:2983  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2014 Vol.15 No.2 P.126-138  DOI:10.1631/jzus.C1300066
24Performance study of selective encryption in comparison to full encryption for still visual images
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:8393  Download:3479  Cited:6  <Full Text>  <PPT> 1879
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.435-444  DOI:10.1631/jzus.C1300262
25Designing a location update strategy for free-moving and network-constrained objects with varying velocity
Author(s):Yuan-Ko Huang, Lien-Fa Lin  Clicked:7617  Download:2306  Cited:1  <Full Text>  <PPT> 1542
Journal of Zhejiang University Science C  2014 Vol.15 No.8 P.675-686  DOI:10.1631/jzus.C1300337
26Data center network architecture in cloud computing: review, taxonomy, and open research issues
Author(s):Han Qi, Muhammad Shiraz, Jie-yao Liu, Abdullah Gani, Zulkanain ABDUL Rahman, Torki A. Altameem  Clicked:10742  Download:3846  Cited:9  <Full Text>  <PPT> 2339
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.776-793  DOI:10.1631/jzus.C1400013
27Max-margin based Bayesian classifier
Author(s):Tao-cheng Hu, Jin-hui Yu  Clicked:5690  Download:2360  Cited:1  <Full Text>  <PPT> 1531
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.973-981  DOI:10.1631/FITEE.1601078
28Maximizing power saving with state transition overhead for multiple mobile subscriber stations in WiMAX
Author(s):Bo Li, Sung-kwon Park  Clicked:5451  Download:1931  Cited:1  <Full Text>  <PPT> 1462
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1085-1094  DOI:10.1631/FITEE.1500314
29FlowTrace: measuring round-trip time and tracing path in software-defined networking with low communication overhead
Author(s):Shuo Wang, Jiao Zhang, Tao Huang, Jiang Liu, Yun-jie Liu, F. Richard Yu  Clicked:5851  Download:3849  Cited:0  <Full Text>  <PPT> 1753
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.2 P.206-219  DOI:10.1631/FITEE.1601280
30DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks
Author(s):Mei-juan Jia, Hui-qiang Wang, Jun-yu Lin, Guang-sheng Feng, Hai-tao Yu  Clicked:5871  Download:2115  Cited:0  <Full Text>  <PPT> 1518
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.4 P.559-569  DOI:10.1631/FITEE.1601535
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE